Логотип exploitDog
bind:"BDU:2021-03177" OR bind:"CVE-2020-26147"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2021-03177" OR bind:"CVE-2020-26147"

Количество 28

Количество 28

fstec логотип

BDU:2021-03177

больше 4 лет назад

Уязвимость реализации алгоритмов WEP, WPA, WPA2 и WPA3 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

CVSS3: 5.4
EPSS: Низкий
ubuntu логотип

CVE-2020-26147

больше 4 лет назад

An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.

CVSS3: 5.4
EPSS: Низкий
redhat логотип

CVE-2020-26147

больше 4 лет назад

An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.

CVSS3: 5.4
EPSS: Низкий
nvd логотип

CVE-2020-26147

больше 4 лет назад

An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.

CVSS3: 5.4
EPSS: Низкий
debian логотип

CVE-2020-26147

больше 4 лет назад

An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, ...

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-f393-4p85-6h6g

больше 3 лет назад

An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.

CVSS3: 5.4
EPSS: Низкий
oracle-oval логотип

ELSA-2021-9406

около 4 лет назад

ELSA-2021-9406: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9404

около 4 лет назад

ELSA-2021-9404: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9453

около 4 лет назад

ELSA-2021-9453: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9452

около 4 лет назад

ELSA-2021-9452: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:0947-1

больше 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:0843-1

больше 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1913-1

больше 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1912-1

больше 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1899-1

больше 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1891-1

больше 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1890-1

больше 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1888-1

больше 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1887-1

больше 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2451-1

около 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2021-03177

Уязвимость реализации алгоритмов WEP, WPA, WPA2 и WPA3 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

CVSS3: 5.4
0%
Низкий
больше 4 лет назад
ubuntu логотип
CVE-2020-26147

An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.

CVSS3: 5.4
0%
Низкий
больше 4 лет назад
redhat логотип
CVE-2020-26147

An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.

CVSS3: 5.4
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2020-26147

An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.

CVSS3: 5.4
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2020-26147

An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, ...

CVSS3: 5.4
0%
Низкий
больше 4 лет назад
github логотип
GHSA-f393-4p85-6h6g

An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.

CVSS3: 5.4
0%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2021-9406

ELSA-2021-9406: Unbreakable Enterprise kernel-container security update (IMPORTANT)

около 4 лет назад
oracle-oval логотип
ELSA-2021-9404

ELSA-2021-9404: Unbreakable Enterprise kernel security update (IMPORTANT)

около 4 лет назад
oracle-oval логотип
ELSA-2021-9453

ELSA-2021-9453: Unbreakable Enterprise kernel-container security update (IMPORTANT)

около 4 лет назад
oracle-oval логотип
ELSA-2021-9452

ELSA-2021-9452: Unbreakable Enterprise kernel security update (IMPORTANT)

около 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:0947-1

Security update for the Linux Kernel

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:0843-1

Security update for the Linux Kernel

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:1913-1

Security update for the Linux Kernel

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:1912-1

Security update for the Linux Kernel

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:1899-1

Security update for the Linux Kernel

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:1891-1

Security update for the Linux Kernel

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:1890-1

Security update for the Linux Kernel

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:1888-1

Security update for the Linux Kernel

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:1887-1

Security update for the Linux Kernel

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2451-1

Security update for the Linux Kernel

около 4 лет назад

Уязвимостей на страницу